期刊文献+

P2DR2闭环动态安全模型的企业网应用研究

下载PDF
导出
摘要 以对象企业网络的实际运行环境及真实需求为研究背景,在P2DR2闭环动态安全模型理论分析的基础上,给出了企业网络安全体系设计方案。据此进行了相关实验研究,为企业网安全体系的设计构造提供了重要依据。实际运行结果表明,安全设计方案有良好的性能。
出处 《电子商务》 2009年第6期68-71,共4页 E-Business Journal
  • 相关文献

参考文献4

二级参考文献83

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 2Yao-Min Chen,Yanyan Yang.Policy Management for Network-based Intrusion Detection and Prevention[J].Network Operation and Ma-nagement Symposium,2004,(2):219-232.
  • 3L P Gaspary,L F Balbinot,L R Tarouco.Monitoring High-Layer Protocol Behavior Using the Trace Architecture[J].Network Operation and Management Symposium,2001,(1):99-110.
  • 4Definitions of Management Objects for the Delegation of Management Scripts[S].RFC3165,IETF,2001.
  • 5BrianCaswell JayBeale etal 宋敬松.Snort 2.0 Intrusion Detection [M].北京:国防工业出版社,2004..
  • 6K Llgun,R A Kemmerer,P A Porras.State Transition Analysis:A Rule-based Intrusion Detection System[J].IEEE Transactions on Software Engineering,1995,21:181-199.
  • 7Xinyou Zhang,et al.Intrusion Prevention System Design[J].Computer and Information Technology,2004:386-390.
  • 8Qu G.,Jayaprakash,Ramkishore M.,Hariri S.,Raghavendra C.S.A framework for network vulnerability analysis.In:Proceedings of the 1st IASTED International Conference on Communications,Internet,Information Technology (CⅡT2002),St.Thomas,Virgin Islands,USA,2002,289~298
  • 9Moore A.P.,Ellison R.J.,Linger R.C.Attack modeling for information security and survivability.Carnegie Mellon Univer sity:Technical Note CMV/SEI-2001-TH-001,2001
  • 10Jonsson E.,Olovsson T.A quantitative model of the security intrusion process based on attacker behavior.IEEE Transactions on Software Engineering,1997,23(4):235~245

共引文献119

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部